You are on page 1of 8

Available online at www.sciencedirect.

com

ScienceDirect
ICT Express 7 (2021) 327–334
www.elsevier.com/locate/icte

Blockchain side implementation of Pure Wallet (PW): An offline transaction


architecture
Ikechi Saviour Igboanusi, Kevin Putra Dirgantoro, Jae-Min Lee, Dong-Seong Kim ∗
Networked System Laboratory, Department of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi, South Korea
Received 19 January 2021; received in revised form 22 June 2021; accepted 2 August 2021
Available online 20 August 2021

Abstract
This article proposes an electronic payment architecture named Pure Wallet (PW), which extends the concept of Blockchain cryptocurrency
for offline transactions. The process is divided into three steps. The first step requires the use of Internet connection, to convert cryptocurrency
into a token at the token manager. The token manager initiates a transaction that requires the information in the token to complete. Then
offline transactions step is performed between electronic devices like mobile phones through a secure Near Field Communication (NFC)
using the token in senders device. The financial value in the form of a token is encrypted by the sender and sent to the receiver’s device
via NFC. In the third step, the receiver converts the received token into cryptocurrency in the presence of Internet connection by sending the
information required to complete the transaction to the token manager. The goal is to propose an electronic payment architecture utilizing
Blockchain, which will enable financial transactions without instant connection to the Internet. The Blockchain implementation in this work
utilizes smart contract in Ethereum Blockchain. The result shows a successful transfer of value without instant Internet connection. The open
issues related to Blockchain in offline transactions are listed for further research works.
⃝c 2021 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V. This is an open access
article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Blockchain; Cryptocurrency; e-wallet; Near Field Communication (NFC); Offline transaction; Pure Wallet (PW); Smart contract

1. Introduction The concept of Blockchain has been invented to remove


restrictions posed on financial transactions by financial in-
The need for daily financial transactions has led to the stitutions. This Blockchain paradigm is especially popular
development of several electronic payment systems that have for financial transactions, but is also becoming popular for
made exchange of values relatively easier compared to the non-financial purposes, popularly for wireless networks [2].
traditional means. But, doing so requires financial institutions Cryptocurrency has emerged to create a decentralized banking
and presence of heavy communication equipment to do this system, where no financial institution controls the money.
efficiently. The transactions using payment cards expose a Cryptocurrency is a kind of virtual currency that uses cryp-
lot of personal information to all the entities that participate tography to protect transactions [3]. Before the introduction
in the transaction [1]. As mobile phones are taking most of cryptocurrency, two factors determine the success of an
of the functions like complimentary card, identification, and electronic transaction namely; financial institution and Internet
credit/debit card to name a few, it still has many limitations in connection. With the introduction of cryptographic payment
its current form for global adoption. The beauty of traditional like Bitcoin and Ethereum, the role of financial institutions
has been successfully eliminated. But the need for instanta-
cash transactions is the freedom to spend money anywhere,
neous connection to Internet to enable Blockchain transaction
at any time, with whoever wants the legal tender, and this is
is still a limitation of the current architecture. The existing
something the phone is yet to achieve.
Blockchain methods require Internet connection at the moment
∗ Corresponding author.
of transaction, limiting for global adoption.
E-mail addresses: ikechisaviour@gmail.com, dskim@kumoh.ac.kr
Researchers have made efforts to create an offline
(D.-S. Kim). cryptocurrency. Though cryptocurrency is protected with cryp-
Peer review under responsibility of The Korean Institute of Communica- tographic encryption, a Blockchain device is prone to unau-
tions and Information Sciences (KICS). thorized hacking. In [4] authors proposed BlueWallet which
https://doi.org/10.1016/j.icte.2021.08.004
2405-9595/⃝ c 2021 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V. This is an open access
article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee et al. ICT Express 7 (2021) 327–334

uses hardware token for completing transactions. This ap- and cons of cryptocurrency. Authors of [10] proposed the
proach succeeded in keeping the private key (in hardware) combination of Ethereum and IoTeX miner to shorten the
offline, making the wallet secure, but it still requires point of transaction time in IIoT. The same authors proposed the use
sale (POS) Internet connection to the Blockchain network to of non difficulty proof in [11] to reduce the transaction time.
make transactions. This approach uses Elliptic Curve Digital Works in IIoT as presented in [12] focused on privacy and
Signature Algorithm (ECDSA) for verification and signing of security of cryptocurrency mobile applications. It examines
transactions. The transaction is introduced into the Bitcoin Android cryptocurrency and financial services applications and
network if observed as valid by the POS. Other peers in the the underlying security profile. After examining the common
network in due course will verify and confirm the transaction
vulnerability, they reported that in terms of privacy, the finan-
before it is added to the Bitcoin network. The ledger of a Bit-
cial service applications are better and are still better (though
coin network is the end point of every confirmed Blockchain
marginally) than cryptocurrency in terms of security provi-
transaction. It takes between 10 and 40 min to complete this
process. sions. Authors of [13] proposed Multi-Factor Authentication
In [5], the authors proposed the use of Blockchain in (MFA) which tries to improve cryptocurrency security. MFA
the card payment system. This is to reduce charges from approach is hinged on time-based one-time based password
financial institutions incurred by merchants for using payment (TOTP), which is found to provide a more secure transac-
cards and to protect sensitive information especially personal tion. The authors in [14] demonstrated security-enabled near
identification details of the participants during transaction. The field communication tags using flexible architecture supporting
Blockchain has a centralized virtual ledger which controls cryptography. This is to solve the security problem of NFC by
access of participants, saves and encrypts transaction details, using symmetric and asymmetric cryptocurrency architecture.
removes the need for a trusted middleman, and limits exposure The motivation of this work is to propose an architecture
of information. A merchant local payment machine is able to that will function without instant connection to the internet.
determine at once if a card from a customer can complete As all transactions must be made with Internet connection,
a transaction within limits of the payment card terms. The it renders cryptocurrency unfit for transactions in places like
available amount is saved to the Blockchain ledger and the last rural areas, in aeroplanes (on flight) and even in case of sudden
information time update is obtainable, otherwise the system disconnection by Internet providers. The concept of offline
will refresh if the available information is outdated. Despite
crypto transaction was introduced in [15] as Pure Wallet (PW).
the contributions of this work, the authors did not consider
The scope of this work is to implement the Blockchain aspect
their Blockchain solution for offline transactions.
of PW. This article will use the concept of cryptocurrency
Authors in [6] explored the use of hardware to create a
wireless mesh connection, with other device users to overcome payment systems to explain the proposed algorithm. This
the problem of poor or no Internet connection, for Bitcoin algorithm can also be applied in other Blockchain applications
transactions. In this case, several equipments are needed to such as in IoT and conducting electronic elections. It is a
complete the setup. A block stream satellite receiver is in- combination of three steps; first is an online step, then an
stalled to download block chain data from the satellite. This offline, and finally another online step. Internet connection is
device is bulky and mostly stationary. To extend the connection required during the two online steps and NFC is required for
from the receiver, a GoTenna mesh is used to create a mobile the offline step of the transaction. Pure wallet (PW) proposes a
connection within a limited range. A device with a wallet is solution not as a replacement to the existing Internet based ar-
also required to read the downloaded information. To create a chitecture, but as an extension to enable offline cryptocurrency
means for up-link, other sets of equipment are required. This transaction, for a more rapid adoption and users convenience.
approach succeeded in extending connection to fixed areas As a brief summary, the innovation and contributions of this
without internet access. However it has the limitation of cost work include the following:
and mobility, because the hardware is costly, must be at a
certain range from other users to function, and is considerably 1 PW introduces Blockchain for offline use cases.
bulky for mobile use. 2 A new token capable of offline transfer is introduced.
The works in [7] explore the use of NFC enabled android 3 Token is time sensitive for security and avoidance of
mobile for Bitcoin transactions. In their work, the receiver double spending.
sends its account address to the sender using an NFC connec- 4 Introduces the concept of token manager.
tion. The transfer of Bitcoin follows the conventional process 5 We implemented the blockchain aspect of PW to validate
requiring an Internet connection, and takes the same length of the proposed idea.
time as regular transaction.
Authors in [8] explore the opportunities of blockchain for The rest of this article is arranged as follows: Section 2
banking and other financial institutions. The authors of [9] presents the proposed Pure Wallet system model. Section 3
compared cryptocurrency and fiat currency, and their role shows the Blockchain side implementation of the Pure Wallet
in the economy. Their attempt is to figure out how cryp- and the results are shown in Section 4. The expected benefit of
tocurrency improves fiat currency in terms of its performance the proposed approach is presented in Section 5. And finally
of peer-to-peer network transactions. It pointed out the pros the conclusion and future work are in Section 6.
328
I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee et al. ICT Express 7 (2021) 327–334

Fig. 1. Conventional Blockchain architecture showing what happens when


a sender sends money to a receiver, and what happens at the back-end from
the sender through the miner to the receiver. It also shows activities requiring Fig. 3. The process of making a cash transaction involving withdrawal
Internet access. of money from the payer’s bank account. The physical cash is used for
transactions and the payee deposits the money in a bank account.

a conventional Blockchain architecture. Fig. 2 shows the


configuration of PW Blockchain architecture including the
conversion process from crypto coins to electronic token at the
sender (payer) account and vice versa at the receivers (payee)
end. This conversion process at token manager can only take
place when there is Internet connection. The token manager
resides in the network. Any transactions through the token
manager is seen in the network as a transaction that has been
initiated but is yet to be completed. The token is transferred
from a sender to a receiver over an Near Field Communication
(NFC). The receiver uses that token to retrieve the coin value
from the token manager. The PW algorithm is represented in
Fig. 2. Shows the block diagram of the proposed PW Blockchain architec- Algorithm 1. A token is valid for transfer at the senders device
ture. The sender sends a token through NFC connection to the receiver. The within a certain time Ts , and for only one transaction. Received
verification process happens over the Internet connection through the token token can only be sent to the Token Manager, which implies
manager and the miner. that a receiver cannot send it into a new account. A time Tr is
given for the receiver to claim the value of the received token.
If the sender device does not make any transaction before Ts ,
2. System model it will have to wait for Tt before the token can be reconverted
Using the insight of the above discussed works, this article to crypto coins. After Tt the unclaimed coins will return to the
proposes Pure Wallet, an architecture to perform offline and sender’s account.
real-time cryptocurrency transaction. The coin in the presence Ts + Tr ≤ Tt (1)
of Internet connection is converted into a token transferable
The token manager holds all the token submitted by all
over an NFC mobile connection. The receiver device retrieves
payees until time Tt . The token manager completes all transac-
the token value in the presence of an Internet connection.
tions associated with a token generated during one coin-token
We assumed that the mobile application has the capacity to
conversion, before returning the balance of unused token to
identify if a co-transacting device is legitimate or not. Consider
the sender’s coin account. This is meant to prevent the chance
a need to make payment on-board an aeroplane, the only of double redemption by the payee.
possible payment is using cash, which has no equivalent in
cryptocurrency following its current form. To make this kind 2.2. Real cash versus PW Digital cash
of transaction possible there has to be a sort of value that is
transferable during an offline situation. To achieve a secure The process of using cash for transactions is a traditional
transaction, digital cash in the form of a trusted secret token means as illustrated in Fig. 3. Before a transaction is made,
is needed. the payer withdraws cash from a bank account. During the
transaction, the cash is handed over in exchange for a good or
2.1. PW Digital Cash architecture service. The cash is taken to the bank and deposited into an
account by the payee. A similar process is mimicked in PW
To achieve offline electronic transactions, it is necessary to for offline transactions, but instead of physical cash a token
create a form of value transfer system which works efficiently is used. PW processes are illustrated in Fig. 4, to show its
without instant connection to the Internet. Fig. 1 illustrates similarity with cash transaction as shown in Fig. 3.
329
I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee et al. ICT Express 7 (2021) 327–334

Algorithm 1: Pure Wallet (PW) processes


1 Sender sends coin to Token Manager (TM) via
Internet access
2 sender receives token via Internet access
3 while Transaction is in offline do
4 Sender initiates a hands shake
5 receiver sends acknowledgment
6 receiver pulls token from sender
7 sender confirms amount
8 sender transfers the token
9 receiver checks value and authorization on token
10 receiver removes any duplicate of sent token from
the sender’s account
11 receiver confirms receipt and terminate transaction
12 end
13 Receiver sends token to TM
14 TM forwards the transaction to miners for mining
15 Receiver receives the coin

Fig. 5. Interaction between sender and receiver in PW transaction during


NFC exchange of token. The process is initiated by the sender and is
terminated by the receiver. The acknowledgment and encryption is for
security between sender and receiver.

stored in a tamper resistant SE and Trusted Platform Module


(TPM)-based attestation modules on the devices.
The token is used for transactions as shown in Fig. 5
between NFC devices even without connection to Internet. The
NFC process is initiated by the sender with a handshake. An
Fig. 4. Proposed PW Blockchain architecture showing the process of acknowledgment shows the profile of the receiver and is used
payment from the payer to the payee using a token over an NFC connection. to confirm if the token is sent to the right device. The receiver
The token mimics the role of cash in cash transactions.
device pulls the value of token to be transferred. The sender
device transfers token after confirming the value of transfer.
2.3. Near Field Communication (NFC) The receiver device removes the used tokens from senders
device and terminate transaction. The removal of used token
is the first precautionary measure to prevent double spending.
To transfer the token without Internet connection, there
must be a close range communication between the receiver and
sender. It is important for this transfer of token to happen under 3. Implementation
a secure condition capable of preventing cyber attacks, which
The pure wallet transaction is divided into three main steps.
makes NFC a viable candidate. Legacy NFC devices often
are weakly encrypted or even lack encryption due to power 1 In the first step the sender converts some coins to token
and computational requirement, making them vulnerable to from the token manager (TM). This process is repre-
attacks [16], all that has recently changed. NFC is a wireless sented in Fig. 6 as A and B Internet connection
technology with short range (about 4 cm) usually consisting of is required to complete this step. The pseudo code for
two portable devices, connected in a peer-to-peer configuration this process is shown in Algorithm 2.
as illustrated in Fig. 5. Using higher layer cryptographic 2 In the second step, the token information is transferred
protocols such as secure socket layer (SSL), NFC connections from the sender to the receiver. This step does not require
are secure from eavesdropping. An NFC Secure Element (SE) the connection to the internet to be successful. It can
complimentary attestation and validation for mobile devices is be transferred through Bluetooth, WiFi, NFC etc. In
capable of providing a secure on demand access, by utilizing this paper, this step was done manually by typing the
NFC-based Host Card Emulation (HCE) [17]. A token is information into the receiver device and is represented
created by a cloud base Trusted Certified Authority (TCA) and as C in Fig. 6.
330
I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee et al. ICT Express 7 (2021) 327–334

Algorithm 4: SC process at token manager


1 receive coin from sender.
2 combine senders address and transaction hash
information create token (T1 ).
3 send a token to sender’s device.
4 initiate a transact that requires T1 to send coin.
5 send coin to any address that provides T1 information
within time (Tr )
6 else return the coin value to the sender after time Tt
7 end transaction

Fig. 6. Pure Wallet implementation architecture.

3 The last step as shown in Fig. 6 as D and E . In


this step, the token in the receiver’s device is transmitted
over the Internet to the TM, which in response transfers
the appropriate coin value to the receiver’s account. The
Fig. 7. A request to retrieve 10 tokens from TM by receiver device. The
pseudo code for this process is shown in Algorithm 3. SC token reserve change from 10 (before the transaction) to 0 (after token
all token has been claimed).
While Smart Contract (SC) is not listed as one of the steps,
it plays an important role in the transaction process. The SC is
a piece of transaction code that executes a set of instructions Table 1
according to the terms of agreement of a contract. The SC Specification of used device.
resides in the ledger on the Blockchain network. Whenever a Item Specification
transaction is made between any sender and the TM, a process Computer Mac air 2015
for another transfer is initiated at the TM. The new transfer Memory 4Gb ram
Storage 256 Gb
process can only be completed with information contained Processor 1.6 GHz dual core Intel core i5
in the token associated with the transaction. This process is Operating system Mac OS Sierra
represented in Algorithm 4.

Algorithm 2: Sender to the token manager In this implementation, the sender, the receiver, and the
1 Sender sends coin to TM token manager are all different accounts on the same device.
2 mining process There is only a single miner in the network. Table 1 shows the
3 TM sends token to sender specification of the used device. All the implementation codes
4 TM initiates a new transaction for this paper have been uploaded in the Networked Systems
Lab website; its URL is in Ref. [18].

Algorithm 3: Receiver from the token manager 4. Experimental evaluation


1 Send token to TM We conducted experimental evaluation to demonstrate the
2 TM completes pending transaction result of PW implementation. Specifically our demonstrations
3 mining process were conducted to show the Blockchain implementation of
4 TM sends coin value to receiver
PW architecture, using the smart contract feature of Ethereum
Blockchain. We discuss these experiments and results below.
There are five implementation codes for this work. They The architecture utilizes token as the unit for offline transac-
are used to facilitate the desired behavior of the units of the tion. The token resides in the sender’s or the receiver’s device,
architecture. They are listed below. which is transferable over any short range connection (example
NFC, Bluetooth, WiFi etc.). A token with a value of 10 is
• The code executed by the sender’s device. transacted in this evaluation. Fig. 7 shows a request message
• The code executed by the token manager. to claim a 10 token value from the token manager.
• The code executed by the receiver’s device. The process uses Internet connection to connect to the
• The code executed on the SC. Blockchain network. The token manager utilizes the informa-
• The code executed by the miner to ensure automatic tion contained in the token to complete the pending transac-
transaction mining. tion initiated in Algorithm 2, which requires the information
331
I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee et al. ICT Express 7 (2021) 327–334

Fig. 8. Block mining process in a PW architecture using an auto mining


activation protocol for energy efficiency.

Fig. 9. The record of transaction history for account[1–4] showing balance


values before and after transaction. It also shows the activation and
from the token. The TM commits the transaction into the deactivation of the mining process.
Blockchain as the miner mines the transaction as shown in
Fig. 8. It is the same as the mining operation that processes
an online Blockchain transaction. • Reduced transaction fee
The account balance in the various accounts verifies the With the growing popularity of cryptocurrency, users
success of the transaction. Fig. 9 shows the balance in the four are exploited by miners who take advantage of excess
accounts, namely; the miner’s account (accounts[0]), the token waiting time by concentrating on transactions with high
manager or bank (accounts[1]), the senders (accounts[2]), and fees [11]. With PW, transactions can go on at any time
the receiver (account[3]). The first set of account balance independent of the immediate average transaction fee,
displays at the upper half of Fig. 9 is before the request and and the token manager will complete the transfer at a
the balance displayed at the lower half of the figure shows the time with a low average transaction fee.
balance after withdrawal. It is seen that 10 token withdrawal is • Rural area adoption
executed successfully, as the balance in accounts[1] changed The concept of cryptocurrency is to provide financial
from 29.999 to 19.999 indicating withdrawal from the TM and services to all including those in the rural area, where
accounts[3] changed from 9.999 to 19.999 indicating a deposit there is no banking infrastructure. However in such rural
into the receiver’s account. areas, the possibility of making cryptocurrency transac-
tions is slim because of poor or no Internet connection.
5. Strengths/benefits of PW According to the data from International Telecommuni-
cation Union, [19] in 2017 some countries have less than
This proposed pure wallet system is necessary to improve 15% Internet usage, thus making it unlikely to adopt
the experience of using cryptocurrency in four major ar- cryptocurrency in such areas.
eas namely Real time transaction, rural adoption, reduced In Fig. 10 the actual value from year 2000 to 2017
transaction fees, and Internet blind spot. shows continuous growth in Internet penetration trend.
• Real time transaction Prediction made using the actual value shows it will
A regular block-transaction takes about 10 min to be take about 15 years to achieve near 100% adoption
added into a block. The amount of time spent to complete worldwide. With PW, the goal of banking the unbanked
a transaction can even take days based on certain rea- will be achieved faster.
sons. For examples: Block Propagation Time, Number of • Internet blind spot
Miners in the Network, Transaction Fee Set by the User, Passengers during flight can buy products sold by air
Speed of the Web, Spam on the Network and so on [15]. hostesses through PW without having physical cash.
With PW, real-time transactions can be successfully done Also, urban areas with poor or no Internet connectivity
at any time. An NFC phone operating at 13.56 MHz are considered as part of potential beneficiaries of our
frequency delivers a data rate of 424 kbit/s. A token of proposed Blockchain algorithm.
64 characters encoded with UTF-8, UTF-16, or UTF-
32 is delivered in 0.0012 s, 0.0023 s, and 0.0047 s 6. Conclusion
respectively. The token manager completes the transfer to While the awareness and adoption of Blockchain growing
the receiver’s crypto coin account at time Tt after receipt globally, it is still limited to people who have internet connec-
of the token from the payee. tion. This article has presented a Blockchain architecture that
332
I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee et al. ICT Express 7 (2021) 327–334

Fig. 10. (A) Represents the number and % of individuals using the Internet, 2005–2019. (B) Represents the Internet usage penetration index in % from
2000–2017, according to the International Telecommunication Union [17], and the predicted penetration index from 2018–2034.

enables offline transactions by introducing a token manager References


into the blockchain network, and applying the token and
[1] A.N. Mian, A. Hameed, M.U. Khayyam, F. Ahmed, R. Beraldi, En-
smart contract features. It elaborated and implemented the hancing communication adaptability between payment card processing
Blockchain aspect of a new payment technique for cryptocur- networks, IEEE Commun. Mag. 53 (3) (2015) 58–64.
rency termed Pure Wallet (PW). This involves conversion of [2] A.A. Brincat, A. Lombardo, G. Morabito, S. Quattropani, On the use
cryptocurrency into digital token which is used for transaction of blockchain technologies in WiFi networks, Comput. Netw. (ISSN:
1389-1286) 162 (2019) http://dx.doi.org/10.1016/j.comnet.2019.07.011.
during an offline state. The blockchain side implementation
[3] B.A. Ramadhan, B.M. Iqbal, User Experience Evaluation on the
of the PW architecture was successfully implemented using Cryptocurrency Website by Trust Aspect, in: International Conference
Ethereum enabled smart contract. An offline transaction of 10 on Intelligent Informatics and Biomedical Sciences 2018 (ICIIBMS),
token was done, hence proving that the PW architecture has pp. 274-279.
successfully enabled Blockchain for offline transactions. This [4] T. Bamert, C. Decker, R. Wattenhofer, S. Welten, Bluewallet: The
work will positively impact the adoption of Blockchain, also secure bitcoin wallet, Secur. Trust Manag. (2014) 65–80.
[5] D. Godfrey-Welch, R. Lagrois, J. Law, R.S. Anderwald, Blockchain
it provides a pointer to other researchers on the possibility of
in payment card systems, SMU Data Sci. Rev. 1 (1) (2018) 1–44,
offline Blockchain transaction. Article 3.
Our work has limitations which include token divisibility [6] Hackernoon, Completely offline bitcoin transactions, 2019,
i.e. our token must be sent as a whole. In addition, the [Online]. Available: https://hackernoon.com/completely-offline-
proposed technique has no mechanism of detecting falsified bitcoin-transactions-4e58324637bd.
tokens. Finally the behavior of the PW in a large adoption [7] D.A. Bronleewe, Bitcoin NFC (M.S. thesis), Dept. Elect. and
Comp. Eng., The University of Texas at Austin, USA, 2011,
environment is also areas for further research. In the future,
[Online] Available: https://repositories.lib.utexas.edu/bitstream/
we hope work on the these limitations and apply this proposed h{and}le/2152/ETD-UT-2011-08-4150/BRONLEEWE-MASTERS-
algorithm to voting systems to improve the works in [20], by REPORT.pdf?sequence=1&isAllowed=y.
adding offline features to their proposed Blockchain voting [8] D. Unal, M. Hammoudeh, M.S. Kiraz, Policy specification and
technique. verification for blockchain and smart contracts in 5G networks, ICT
Express (ISSN: 2405-9595) 6 (1) (2020) 43–47, http://dx.doi.org/10.
1016/j.icte.2019.07.002.
Declaration of competing interest [9] M.R. Islam, I.F. Al-Shaikhli, R.M. Nor, K.S. Mohammad, Cryptocur-
rency vs fiat currency: architecture, algorithm, cashflow and ledger
The authors declare that they have no known competing technology on emerging economy, in: 2018 International Conference
financial interests or personal relationships that could have on Information and Communication Technology for the Muslim World,
2018, pp. 69-73.
appeared to influence the work reported in this paper.
[10] K.P. Dirgantoro, J.M. Lee, D.S. Kim, Private ethereum blockchain
for industrial internet of things (IIoT), in: KICS-Winter 2019, 2019,
Acknowledgment pp. 1416–1417.
[11] K.P. Dirgantoro, Jae-Min Lee, Dong Seong Kim, None difficulty proof-
This research was supported by the MSIT (Ministry of of-work blockchain algorithm for industrial IoT, in: Proceedings of
Symposium of the Korean Institute of communications and Information
Science and ICT), Korea, under the Grand Information Tech-
Sciences, 2019.6, pp. 1473-1474.
nology Research Center support program (IITP-2021-2020-0- [12] A.R. Sai, J. Buckley, A.L. Gear, Privacy and security analysis of
01612) supervised by the IITP (Institute for Information & cryptocurrency mobile applications, in: 2019 Fifth Conference on
communications Technology Planning & Evaluation). Mobile and Secure Services (MobiSecServ), 2019, pp. 1-6.
333
I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee et al. ICT Express 7 (2021) 327–334

[13] K.A. Taher, T. Nahar, S.A. Hossain, Enhanced cryptocurrency security [17] D. Sethia, D. Gupta, H. Saran, NFC secure element-based mutual
by time-based token multi-factor authentication algorithm, in: 2019 authentication and attestation for IoT access, IEEE Trans. Consum.
International Conference on Robotics, Electrical and Signal Processing Electron. 64 (4) (2018) 470–479.
Techniques (ICREST), 2019, pp. 308-312. [18] I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee, D.-S. Kim, Pure wallet
[14] T. Plos, M. Hutter, M. Feldhofer, M. Stiglic, F. Cavaliere, Security- code, networked systems lab, 2020, posted 03.09.2020, accessed
enabled near-field communication tag with flexible architecture 03.09.2020, http://nsl.kumoh.ac.kr/include/sub.php?m=134&mode=
supporting asymmetric cryptography, IEEE Trans. Very Large Scale Read&serial_no=202009030001&com_id=bi0001&menu_cd=30&
class_cd=106&Page_Num=&left=&item=&find=&m=134.
Integr. (VLSI) Syst. 21 (11) (2013) 1965–1974.
[19] Proportion of households with Internet access, ICT Facts and Figures,
[15] I.S. Igboanusi, J.M. Lee, D.S. Kim, Blockchain adoption in rural area:
International Telecommunication Union (ITU, 2017, [Online]. Avail-
The role of internet penetration, in: Proceedings of Symposium of the able, https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx.
Korean Institute of communications and Information Sciences, 2020, [20] T. Dimitriou, Efficient, coercion-free and universally verifiable
pp. 1207–1210. blockchain-based voting, Comput. Netw. (ISSN: 1389-1286) 174
[16] R. Jin, K. Zeng, Secure inductive-coupled near field communication (2020) http://dx.doi.org/10.1016/j.comnet.2020.107234.
at physical layer, IEEE Trans. Inf. Forensics Secur. 13 (12) (2018)
3078–3093.

334

You might also like